![Black Box LES1516A User Manual Download Page 82](http://html1.mh-extra.com/html/black-box/les1516a/les1516a_user-manual_2762893082.webp)
82
1.877.877.2269
BLACKBOX.COM
NEED HELP?
LEAVE THE TECH TO US
LIVE 24/7
TECHNICAL
SUPPORT
1.877.877.2269
CHAPTER 5: SERIAL PORT, HOST DEVICE AND USER CONFIG
To allow all users operating from within a specific range of IP addresses (in this case the 30 addresses from 204.15.5.129 to
204.15.5.158) to be permitted connection to the nominated port:
Network IP address: 204.15.5.128
Subnet Mask: 255.255.255.224
Click Apply.
NOTE: The above Trusted Networks will limit access by Users and Administrators to the console serial ports. They do not restrict
access by the Administrator to the console server itself or to attached hosts. To change the default settings for this access,
you will to need to edit the IPtables rules as described in Chapter 16.
5.6 SERIAL PORT CASCADING
Cascaded Ports enables you to cluster distributed console servers so up to 1000 serial ports can be configured and accessed
through one IP address and managed through the one Management Console. One console server, the Master, controls other
console servers as Slave units and all the serial ports on the Slave units appear as if they are part of the Master.
Black Box’s clustering connects each Slave to the Master with an SSH connection. This is done using public key authentication
so the Master can access each Slave using the SSH key pair (rather than using passwords). This ensures secure authenticated
communications between Master and Slaves enabling the Slave console server units to be distributed locally on a LAN or remotely
around the world.
5.6.1 AUTOMATICALLY GENERATE AND UPLOAD SSH KEYS
To set up public key authentication, first generate an RSA or DSA key pair and upload them into the master and slave console
servers. This can be done automatically from the Master.
Select System > Administration on the master’s Management Console.
Check Generate SSH keys automatically.
Click Apply.
Next, select whether to generate keys using RSA and/or DSA (if unsure, select only RSA).
FIGURE 5-20. SSH KEYS SCREEN